| CPC G06F 21/6218 (2013.01) | 20 Claims |

|
1. A secure storage facility comprising:
a first computer system comprising at least one computer processor unit and at least one non-transitory data store, wherein at least a portion of the at least one non-transitory data store has sensitive information stored thereon, and
wherein the first computer system is programmed with one or more sets of instructions that, when executed by the first computer system, cause the first computer system to execute a method comprising:
determining that a user of a second computer system is authorized to access at least some of the sensitive information;
determining at least one attribute of the user;
providing information representing the at least one attribute as an input to a hash function;
generating an identifier of the user based at least in part on an output received from the hash function in response to the input;
generating a set of text representing the identifier of the user;
generating a link to a networked resource, wherein the link comprises the set of text representing the identifier of the user;
encoding at least a first bar code with the link;
incorporating at least the set of text representing the identifier of the user and the first bar code into a document comprising at least some of the sensitive information;
causing a display of the document on at least one display of the second computer system;
receiving a request for the networked resource from a third computer system over one or more networks; and
determining, based at least in part on the request, that at least one image of the at least some of the sensitive information was captured by the third computer system.
|